Академический Документы
Профессиональный Документы
Культура Документы
Title of the project: Radio Frequency Identification (RFID) based Access Control
When you think of a gated community, what comes to mind? Probably things like safety,
security, exclusivity, expensive homes, and more. Gated communities provide a lot of
benefits to the residents that live within them. The number one reason people choose to
Gated community living concept started with an aim of increasing the security aspects
and expecting minimum chances of theft, security breaches and other crimes. Though
the number of such incidents has been reduced, however, such incidents still happens
- There is no concept of identity proof as ID card, Access Card etc for residents
- Guard does not properly check the qualifications and authenticity of personal
before letting them in as people get irritated by frequent checks and sometimes
It is very difficult for guards to remember all the residents and others by face and name.
- Guards are rotated frequently by security agency so they should not get
familiarized and friendly with residents and others as it will increases the chances
- Guards are not competent and qualified enough to do their job. They are
generally hired to show some threat to thief, burglar and other unsocial elements.
When security guards cannot remember the residents by face it further causes following
two problems.
-When the guards check or verify the residents and others at the gate, it takes
long time and if happens regularly the residents starts getting irritated and trying
to avoid these things by some argument which result in unhappy situation and
-Generally guards check the people for formality. What does the guard check is
become a serious question mark? The gatekeeper might be letting everyone in.
While we may assume that only residents are allowed inside the gate, there are
other people who may be coming or going every day, such as delivery people,
Objective of this project to design and develop RFID (Radio Frequency Identification)
based ACS (Access Control System) for gated community to provide better security to
them.
(i) Design and development of Access Control Software (Watch Dog Access
Control Software).
(iii) All members will get RFID based ID Card which will provide them hassle
free and secure access to their community. Addition to this they will also
(iv) Others like permanent workers, servant, gardener etc will also get RFID
based ID Card which will not only provide them access to community but
also record their in/out timings which can be used for their wages
calculation.
(v) Visitors, delivery people, repair workers, hawkers etc will get temporary
RFID based ID Card which will be used to track their movement and
members and others with the help of RFID tags. Reports can be generated as
per the requirement as date, time, member ID etc. When we have the record of
every person who are going out and coming in, it becomes very easy to track the
criminal whenever some incidents or security breach happens. The records will
contain profile of the person who are going out /in along with time and date. This
recording process will take less than a second with the used of Watch Dog
Methodology:
Waterfall methodology will be followed for this project development; progress will flow
Requirement
The most important task in software based product is extracting the requirements from
will be collected. This can be done by either visiting the locality or interacting with
community member or by studying the various documents, literature etc or collecting the
Design
The design phase begins the extremely technical portion of development methodology.
At this point in the process, the project’s requirements, collected during the requirement
phase to produce the Technical Design document for the project. This is comparable to
an architectural blueprint. The Technical Design contains the component, package, and
object layout of project and illustrates how they will interact. It also contains scalability
parameters, detailed hardware requirements, and test plans. With this document, the
project is ready to proceed with the development. This is often called a scope
document.
Once the requirements are gathered, an analysis of the scope of project development
Solution by Innovations
Watch Dog Access Control System is innovative solution for gated community to
provide security at very basic level. It is combination of hardware (RFID Reader) and
software (Watch Dog Access Control Software). Watch Dog Access Control Software
which will have the databank of all the residents, serving people and all other concerned
persons of the community. Every one will be allotted a unique Radio Frequency
Identification (RFID) based Identity Card (ID Card). As the RF ID Card holder passes
the card near a proximity card reader, their particulars with picture will be displayed
on the monitor. The security guards verify the person by comparing him with the
photograph and particulars in the monitor screen and accordingly he can take the
decision whether allow or not to the person. In/Out timing will be automatically updated
in the database and same can be retrieved at latter stage for analyze and investigation.
personnel and other concerned persons. This module will have the code
to add, delete and update the database of persons including RFID detail
and picture.
(iii) Report Generation Module This module will contain code to generate
(iv) Software Access Module This module contains code for software access
(v) RFID Reader Access Module This module will contain code to control
RFID reader and read & write operation from RFID reader.
It is user friendly customized software. Every resident in the gated community will have
As the RFID Card holder passes over the proximity card reader, the profile of the
individual will pop up in the Monitor. The guards can verify the photograph on the
monitor and the card holder along with their other details.
Hardware Requirement
-One Personal Computer
Software
Implementation
Implementation is the part of the process where software engineers actually program
the code for the project. At this stage software code will be written as per the technical
design document. In the implementation phase, the project team is expanded to include
Documenting the internal design of software for the purpose of future maintenance and
Visual Basic 6 (VB6) language is selected to write the code for the Watch Dog
development environment.
Verification
development process. This part of the process ensures that defects are recognized as
early as possible. Software will be tested at every stage and final testing will be done in
dummy environment.
Maintenance
Deployment will start after the code or program is appropriately tested. People are often
resistant to change and avoid venturing into an unfamiliar area, so as a part of the
deployment phase, it is very important to have training classes for new users of your
software. Maintaining and enhancing software to cope with newly discovered problems
or new requirements can take far more time than the initial development of the software.
It may be necessary to add code that does not fit the original design to correct an
code can be added to accommodate their requests. If the labor cost of the maintenance
phase exceeds 25% of the prior-phases' labor cost, then it is likely that the overall
quality of at least one prior phase is poor. In that case, management should consider
the option of rebuilding the system (or portions) before maintenance cost is out of
control.Bug Tracking System tools are often deployed at this stage of the process to
allow development teams to interface with customer/field teams testing the software to
identify any real or perceived issues. All aspects of software development will be taken
care. Industry best practiced Software Development Life Cycle (SDLC) will be followed
Chapterisation scheme:
Following chapter schema will be followed in main report. It will sequentially represent
the case/report.
(i) Chapter-I: Introduction of the Problem: This Chapter will include
significance of the problem, the objectives and the scope of the project and the
the about gated community where the finally project will be implemented will also
be provided.
(RDBMS), Microsoft Visual Studio (IDE) etc. This chapter will also include about
existing software available in the market, their merit and demerit and
(iii) Chapter-III : Methodology: This chapter will describe in detail the steps
(iv) Chapter- IV Design: This chapter will describe the detail design of project as
Flow Chart (FC), Data Flow Diagram (DFD), Physical Diagram (PD), Logical
(v) Chapter- V Implementation: This chapter will include the final coding of the
Various testing scenario will be described in this chapter and result will be
included as Appendix.
(vii) Chapter- VII Deployment & Maintenance: This chapter will describe about
the various deployment scenario and procedure for Access Control System in
(viii) Chapter- VII Summary: This chapter will depict the summary of the project
“Radio Frequency Identification (RFID) based Access Control System (ACS) for Gated
Community”.